SecuMS is a security vulnerability assessment solution which can constantly monitor security levels by finding vulnerabilities
for each server and by suggesting solutions to found issues after automatically monitoring system security.

Features and Advantages

Point of users
  • Security personnel’s work efficiency improvement
  • Screening and conduct process establishment makes security and system operators’ role clear
  • Technological performance enhancement via information sharing
Point of management
  • Security vulnerability screening process building which fits organization
  • Constant monitoring system on vulnerability management status
  • Various systems’ integrated management
Point of function
  • Light operating system which does not affect working systems
  • Integration with work systems (Mail, SMS, Approval)
  • History management with accumulated information

Primary Functions

Vulnerability Assessment
  • Satisfy domestic/foreign compliance standards
  • Regular vulnerability auto screening
  • Urgent manual screening
  • Result and history management
Vulnerability management
  • Vulnerability management process provided
  • Vulnerability response status and result confirmation
  • Vulnerability response history management
Report
  • Detailed report
  • Daily report on vulnerability status
  • Changes and statistics on vulnerability changes
Exception management
  • Exception settings
  • Exception status and history management
  • General exception application
  • Re-detection after expiration

Benefits

  • Daily security detection system: using security assessment tools, the management system 100% auto diagnosed to monitor more than once a day
  • Assessment process improvement: security assessment detects vulnerability, informs result,
    and manages response history to proceed with systemic process
  • IT security number indexation: daily security assessment to provide security level and team security levels
  • Security audit stable management activities: 24 × 365 security activities shorten security assessment preparation and allows stable management activities
  • Security access: server vulnerability report will be linked to email and other systems to increase interest in security

System Diagram

Omniguard provides account management/access control/session logging/appointment/order word control and other features per module, minimizes OS influence, and there is no need for Kernel alteration, which makes it the next generation server security solution.

Features and Advantages

Point of users
  • Without system log in, via Web Console connection, policies are set on the management system
  • When forming access control, the same connection method with conventional working ways
  • No separate S/W to be installed in a person in charge’s computer
Point of management
  • No Kernel revision and no rebooting when installing
  • Detect/block authorized users’ illegal behavior
  • Without system connection, locked/expired accounts are grasped
  • Intrinsically block per system bypass
  • Central monitoring on server working status
Point of function
  • OS fitting session logging/authority distribution/order word control
  • Service/user/IP and other access control settings
  • Account creation/alteration/deletion and security policy support

Primary Functions

Central management
  • Other device server(Unix/Linux/Windows)’s integrative management
  • Policy general application and monitoring
  • Report for each policy
  • Single console support (Web console)
Account management
  • Account creation, alteration, deletion
  • Password policy management
  • Account lock release
  • Management account’s general security policy application
System access control
  • Group/service (Telnet, ftp, rexec, ssh, rlogin, CDE etc.) individual access control
  • Port, distant terminal (Windows)
  • Access control logging history
  • System access OTP support
Session logging/appointment/order word control
  • Session stdin/stdout/stderr and FTP/TELNET connection logging, distant terminal session logging(Windows)
  • Give a certain authority to a user when logging, without sharing root password, authority is distributed
  • Order word control (session blocking, order cancelling, notification)

Benefits

  • Work efficiency improvement: account/access control/session logging/appointment and other server policy’s central management will improve security personnel’s job productivity
  • IT cost reduction: from the creation to the deletion of an account, the whole lifecycle is centrally managed to reduce cost
  • Compliance: Privacy protection act, private information safety regulations, ISMS certification and compliance
  • Asset protection: various service/system access control policies and allowed users’ order word control policy settings respond to internal/external attacks
  • Illegal behavior prevention: account authority settings/order word control/appointment and other policy settings prevent any illegal behavior
  • Post incident response: All session using history logging and post audit/tracking Raw Data storage and searching feature

System Diagram